Going far beyond typical computer forensics books, this thoroughly revised edition of an Artech House bestseller is the only book on the market that focuses on how to protect one's privacy from data theft, hostile computer forensics, and legal action. It addresses the concerns of today's IT professionals, as well as many users of personal computers, offering more detailed "how to" guidance on protecting the confidentiality of data stored on computers. Moreover, the second edition has been updated to include specific information on the vulnerabilities of ancillary computing devices, such as PDAs, cellular telephones and smart cards. This cutting-edge book identifies the specific areas where sensitive and potentially incriminating data is hiding in computers and consumer electronics, and explains how to go about removing this data. The book provides a systematic process for installing operating systems and application software that will help to minimize the possibility of security compromises, and numerous specific steps that need to be taken to prevent the hostile exploitation of one's computer
Auflage
Sprache
Verlagsort
Editions-Typ
ISBN-13
978-1-58053-830-5 (9781580538305)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Michael A. Caloyannides is a senior fellow at Mitretek Systems in McLean, VA. He received his Ph.D. in electrical engineering, applied mathematics and philosophy from California Institute of Technology. He is an adjunct professor at two renown universities and a regular columnist and associate editor for IEEE Computer Society's 'Security and Privacy" magazine
What Is Computer Forensics and Why Is It of Vital Interest to You? Exactly Where Is Potentially Incriminating Data Stored in One's Computer and How Did It Get There. Specialized Forensics Techniques. Practical Means of Protecting Proprietary and Other Confidential Information in Computers. Protection from Online Computer Forensics and from Privacy Compromises: Legal Issues. Security Aspects of Evolving Technologies.